Thursday, December 26, 2013

This is one of those posts that a few of you might think – “I already knew this” or “Does this really deserve a post?“.
But I am gonna post it anyway, because its one hell of a useful tip if
you’re a regular user of this iPhone application and didn’t figure this
out before.
The Skype Application
supports calls using the iPhone headphones, and of course it comes with
loads of features – one of which is to turn off the screen using
iPhone’s built in proximity sensor.

To disable the iPhone screen when using the headphones,
flip the phone so that the screen lies on a solid surface when you’re on
call.

Voila, that was the tip – Apparently when we do this, the proximity
sensor not only turns off the screen/back light but also(indirectly)
helps give you longer battery life and doesn’t heat up the iPhone.
The other versions of this tip would of course be to put a business
card on the iPhone’s proximity sensor and something similar, but I found
flipping the phone to face a soft surface to be the simplest.
You could also use a slip in case which has the same effect.
Beware to place the screen only on a soft surface or if you already
use a case, it’d help you keep the phone a few mm’ above the surface,
still triggering the proximity sensor.credits to: http://woikr.com/

Step 3): Click on "Change Icon..." And scroll right till you see an icon with nothing like as shown: [3]

Step 4): Now click Ok then click Apply and you should get something like this: [4]

Step
5): Now click start then type in character map in the search bar. Open
it and find a blank space. I will show you the slot to make it easier to
find: [5] Click select then copy. You will see nothing in the "Characters to Copy" bar, that is perfectly fine.

Step
6): Now right click on the folder and click rename. Press CTRL + V and
you will get nothing as the name. When you click apply, nothing should
show up as the name: [6]

Step
7): Now find the folder and the calendar sidebar app. Drag the Calender
out of the way and put the invisible folder where the Sidebar is. Drag
the Calender app infront of the folder and you won't be able to see it
anymore: [7]

And
that's about it! Put whatever you want it in it and nobody but you
should be able to find it unless they have a strong eye or they
highlight everything and look closely. Hope you liked the tutorial!

PanARMENIAN.Net
- Mikhail Kalashnikov, the 94-year-old inventor of the world’s most
popular firearm, the AK-47, died Monday, Dec 23, in a Russian hospital, a
local government official said, according to RIA Novosti.
“We
received sad news today: legendary small-arms inventor Mikhail
Kalashnikov died at the age of 94 after a prolonged illness,” Viktor
Chulkov, a spokesman for the head of the Udmurtia republic,
Kalashnikov’s home region, said in Facebook post.
Kalashikov had
been recently admitted to an intensive care unit at a hospital in
Udmurtia’s regional capital, Izhevsk, while “in serious but stable
condition,” according to the local branch of Russia’s Health Ministry.
In June, the famed weapons designer underwent an operation in Moscow to have a pacemaker implanted.

Saturday, December 21, 2013

The first Home Screen of your iPhone or iPad is pretty important,
when you think about it. It’s the easiest screen to reach with the Home
button, so a lot of people want to keep their most important apps on it.
But how do you decide which apps should be there?
One obvious approach is simply to think about the tasks you do on
your device most frequently, then arrange apps and folders accordingly.
Unless you roll with daytime and nighttime iPhones, your first Home Screen might be all work, all play, or a mix of both.
A handy trick that might help you pick the best apps for your first
Home Screen is to check the app switcher every now and then. If you
double-tap the Home button, you’ll see the apps, in order, that you used
most recently. Swipe to the left and you’ll see more.
At least some of the apps you see regularly in the first 1-3
collections of the app switcher are probably prime candidates for your
first Home Screen. You may find that apps you previously buried in a
folder on the last page are the ones you use most frequently, and moving
them to your first Home Screen can save you some daily time and effort
digging to find them.

December 13, 2013 by Jeffrey TaylorRecently, my
assistant approached me about a certain Android tablet. Of course, the
question was, “is [off brand tablet] good?” And of course, I’d never
heard of the off-brand tablet. The purpose of my assistant’s request was
to get a tablet for her 3 year-old son, and the off-brand tablet
promised “kid controls” and “parent protection.” I really questioned my
assistant’s decision, especially since she received the Nexus 7 tablet
for Christmas last year.

The best part of Android is user accounts

Okay, well maybe they’re not the best part, but if your
tablet runs any version of Android above 4.2, then you have the ability
to set up various user accounts. As I explained to my assistant, she
could set up a user account for her son that would only allow particular
apps.
Android 4.2 really revolutionized how people can interact and protect
their Android devices. The introduction of user accounts means that
multiple people can all use the same tablet. In my house, that means the
kids have their own account with specific apps (mostly games).

The separate account gives the users an ability add the apps (you)
they want, set the features they want, and enjoy the Android experience.

Making user accounts happen

Setting up the account is quite easy.
Open Settings.

Click Users under Device.

After you click Add user or profile, you’ll have the option of setting up two different types of user profiles: restricted and regular.

My assistant will use the restricted profile to keep her son from accessing inappropriate apps.

A few words about user settings

Remember, only restricted profiles will allow you to control what content is available on the user’s account.
The Application and content restrictions screen will give you the ability to turn “on” or “off” particular apps already installed on your Android tablet.

Simply click the on/off button to allow the user to access the app.

Making user accounts work

Here are a few tips for making good use of user accounts, and possibly limiting some frustration for you.
First, these tips only apply to restricted profiles. Regular user
accounts function like the main user’s account, except the original user
controls what accounts are on the device.
Second, the restricted profile will still have access to some
settings, such as location or applications (to uninstall apps from the
profile). Android restricts access to core processes, but you need to
know the user can modify some settings.
Third, even with restricted accounts enabled, you should still
monitor the types of apps your kids have access to. Further, Android
4.3+ gives you greater “tuning” ability for particular app settings, but
the developer still needs to enable that feature.
Finally, I recommend that you restrict any Google Play purchases and
require that you enter a password. You can set up that restriction by
clicking Use password to restrict purchases in Google Play settings (Google Play > Menu > Settings).

That setting will help limit (or eliminate) costly, unapproved app purchases. Note: a restricted profile shouldn’t be able to download and install apps, but just in case.

Getting a good tablet means good results

Hopefully, my assistant will read this post and make the most of the
awesome tablet she already has. User profiles give Android devices
running Android 4.2 a greater advantage over older models. If you’re
looking for a way to give your kids a tablet, why not restrict a profile
on the one you have?

Thursday, November 7, 2013

P2P is the acronym for the words “peer to peer”, which means
communication between equals. Computers connect and communicate with
each other without using a central server, building, optimizing and
managing the bandwidth used so that the best path between all nodes or
computers is found.
Due to its characteristics, it’s used to exchange files such as
music, videos, documents and complete software packages. Some Internet
telephone systems use P2P networks to streamline the transmission of
voice and sometimes also stream video (take Skype for instance). Another
use of P2P networks is for processing and handling large amounts of
information.

Types of P2P networks according to their design

Centralized

It maintains a directory on a central server, to which computers make
requests to find the nodes that contain the desired content. Its main
shortcoming is that the central server is a weak point: if it crashes,
nothing works.

Decentralized and structured

Also known as hybrid P2P. There’s no directory on a central server,
but on several independent computers placed in different locations that
make the network easily accesible to other computers.

Decentralized and unstructured

There are no existing computers or nodes that function as central
request controllers. All nodes can act both as clients and servers.

Characteristics of decentralized P2P

Anonymity: users should be able to connect without worrying about their privacy. However, this standard is not always met 100%.

Scalability: implies more security, by not relying on a central server and its capabilities.

Independence: the user interface does not require an Internet browser and every computer can run as a client or server.

Decentralization:
handles connections and temporary variables and temporary addresses ,
and all connected computers are considered equal.

Pros and cons

Advantages

Cost: many
programs are free, which makes them an attractive option for those
looking for free content (the legality of this practice is
questionable). P2P programs with legal content also exist and, despite
having to pay for membership, are a good choice if you want a good
price.

Efficiency: using file sharing is easy and fast.

Disadvantages

Legality: P2P programes have been questioned for sharing music and videos illegally. This has been a source of controversy.

Spyware: many
programs are riddled with spyware or malware, causing a sluggish
performance of your computer, or for it to stop working.

Monday, March 11, 2013

Remembering where you park in a big city can be a headache. But a new iPhone app called Find My Car Smarter works with a a small Bluetooth device that you place in your car to relieve it.
The Find My Car Smarter project raised $40,177 on Kickstarter earlier this year in order to manufacture the system's Bluetooth smart devices.

The car finder app is available in the Apple App Store for $0.99. It only works with the iPhone 4S. The Find My Car Smarter device is $25 -- or $30 with a car USB adapter.
To
use the app, simply sync the car plug-in with your phone once it's in
the car. Upon launching the app, it automatically displays where you
parked, how far away the car is and how long you've parked in that
location -- great for knowing when the meter's up.
Do you frequently forget where you park? Tell us in the comments if you would use this app to track your vehicle.
Photo courtesy of iStockphoto, PeterMcKinnonFrom: t.opne.ws

Wednesday, February 27, 2013

Facebook privacy settings are great. Just a few minutes of
tweaking allows you to create complex rules that makes sharing on
Facebook easy AND safe.
Or so we thought.
I’ll start by prefacing this with two recent developments. The first is that Facebook is now one of Americas most trusted companies, and the second that around 65 million users are now accessing Facebook from mobile devices. It’s these two factors that make the following so concerning.
Have a look at the privacy settings below:

These settings allow friends to see wall posts with the exception of
the “Employees” group. This group has specifically been removed rights
to see wall posts. Or so the setting says…
This setting is does not work correctly and does NOT work at hiding
any wall posts made from Facebook mobile (including the Facebook iPhone
app). This bug is a massive privacy concern.
A friend of the above account in the “Employees” group could not only
see wall posts from mobile devices, but also post to the wall, clearly
against the privacy settings that were in effect. Wall posts from
non-mobile devices were not visible.
The following screenshot shows a wall viewed from an account which
has been added to the ‘Employees’ group with the privacy settings as
above.

We have no way of proving we haven’t ‘shopped the screenshots above
but feel free to try the settings with a friend to prove it to yourself.
We also hope the previous hole we uncovered should give some credibility to our claims.
So there you have it. If you have your boss hidden from seeing wall
posts, you’d better stop your friends posting on your wall from their
phones…
On a side note, the privacy setting does work for status updates made
from mobile devices. For concerns about your social networking posts
showing up on search engine results, you may want to look into a service
like Reputation.com which can help clean up your personal image.From: www.fbhive.com/page

Monday, February 25, 2013

Review:batasoi
therefore what have we learnt from yesteryear year along with what do we out to be'>really need to be wary of in 2013 out to guarantee that each our knowledge and our wallet stay protected ?

despite common beliefs, something you need we've got learnt in 2012 is the idea that apple positively isnt immune from malware. in the past year we've got seen a big rise within the variety of attacks targeting macos x computers - possibly the most notable being the flashfake/flashback trojan.

appearing late in 2011, the trojan became very fashionable in 2012 with estimations so it infected nearly 700, 000 macs, creating it the largest macos x infection to-date. exploiting a vulnerability in java, the malware occurs when victims visit infected web sites, allowing the trojan to remain downloaded directly onto their computers. infected users will then have their computers watched and controlled remotely by hackers, leaving them liable to knowledge theft and fraud.

its no surprise that macs became key targets for attack. apple product are fashionable with many influential politicians and distinguished businessmen ; thus the knowledge stored on these devices is significantly sensitive and important out to cybercriminals. therefore mac users be warned - this threat is simply going out to proceed to grow !

and its not simply apple users who really should be worried. in the past year the quantity of malicious threats targeting the android platform has continued out to rise, demonstrating that could be a key space of interest fro cyber criminals. in reality, 99% of all mobile malware discovered in 2012 targeted android devices - little question a worrying statistic for our avid android user.

the trouble is the idea that android os ticks all the boxes for cybercriminals : its widely used, its quite simple to develop for, and also the wide form of ( unofficial ) application markets mean that those by using the system are able out to download programs ( as well as malicious programs ) from wherever they actually opt for. its for that reason that there's unlikely to remain any slow-down within the development of malicious apps for android - therefore if youre planning on taking out a new phone next year, you would possibly need out to take this into consideration.

2012 too saw variety of high profile privacy breaches. on june 5th, linkedin was hacked and also the passwords of a little over 6. 4 million individuals leaked publically across the web, whereas fashionable web sites dropbox and last. fm too became targets. after all this is often not really a new problem, along with the hacking and leaking of knowledge first gaining media attention whenever the sony playstation network was hacked around the time of 2011, other then its clear that such huge leaks aren't merely a factor as to the past. in reality the trouble might well be a lot of worse than it looks if youve used the exact password for every online account.

in spite of this its not simply the illegal hacking of personal info that will be changing into a difficulty, other then the wider erosion, or loss, of privacy inside the internet. lots of individuals routinely bank, look and socialise online and each time they actually check in to have an online account, they actually are needed out to disclose info concerning ourselves. what lots of individuals fail out to realise is the idea that corporations aggregate and work with this info for advertising and promotional purposes, typically while not us even knowing concerning it, and its not continually clear how out to opt away from this method.

the worth of personal knowledge - out to cybercriminals and legitimate businesses - can no more than grow in the long run, and by it the potential threat out to our privacy will
increase. therefore you would possibly need out to suppose double concerning specifically what info you can giving away online.

as each online and mobile threats continue to start to be a lot of refined every one of us want in order to make certain we are arranging the necessary precautions to remain protected. the year of 2013 appearance set to start to be another busy year for cybercriminals, therefore certain to'>make sure to take care when giving away personal info each online and on mobile devices. certain you'>ensure you dont venture into the internet while not a basic level of protection, use secure passwords and feel careful when visiting third party sites. only by having that further an element of care - you might want to look forward out to a worry free 2013.
Safeguarding Your Digital Life : How to Remain Safe in 2013 Originally published in Shvoong: http://www.shvoong.com/how-to/computers-and-internet/2358052-safeguarding-digital-life-remain-safe/

Saturday, February 23, 2013

Sex is part of human life.Discuss sex seems endless. Though still
considered taboo, but the discussions about sex is still a topic of
interest to be listened to.The activity of sex with a partner is not
just a form of sheer lust overflow. More than that, having sex on a
regular basis can make life more healthy and happy.
Here are 4 reasons why you are having sex

1. Sex prevent flu Research
conducted at Wilkes University in Wilkes Barre, Pennsylvania found that
couples who avidly have sex one to two times a week have A or IgA's
levels. This antibody is responsible for protecting the body from infection and cold weather causes the flu
2.
Sex helps lose weightYou're dieting? We recommend that you increase
your sex activity with a partner. The American Journal of Cardiology
mentioned, activity sex can burn 85 – 250 calories. In fact, according
to Harvard Medical School, mild to moderate sexual activity just like
those doing sports that can burn fat.
3. Sex reduces the risk of prostate cancerAccording
to a study published in the Journal of the American Medical
Association, the more frequently a man ejaculates in a month, then the
smaller the risk of the person is suffering from prostate cancer.
4. Sex reduces the mortality rateHarvard
Medical School research team States, the guy who does orgasm three
times or more a week are reported to have a chance is 50 percent lower
than the danger of death.

Researchers from the
State University of New York and the University of Liverpool also found
that either the man or woman who is sexually active and rarely use
condoms less experienced depression, and more productive in their work.So, don't delay any longer having sex with a partner!

Tuesday, February 19, 2013

Review:SaffanaHow to detect and remove broken links bookmarks from browsers?

After sometimes, some of your favorites bookmarks may contain broken links if pages or websites are no longer available. In this case, a little cleaning is required. Of course it will take a times to remove it manually test it and delete broken links one by one.

Fortunately AM-DeadLink program for Windows can take the job and perform this task easily. Download the software from the official site, then install the programs on your computer.
Remove broken links processDouble click on AM-Deadlink executable file then follow the install direction :

Choose your language and click “OK” Scroll down the list at the top left side and select your browser:

Note: It is also possible to select a backup file (csv, html) containing your favorites. Then click green button to Check bookmarks

AM-DeadLink then test each link from your bookmarks. At the end of the audit, click “Sort bookmarks error into top of the list” for better visibility. Bookmarks pointing to a link unavailable appear in red with a 404 error. To delete them, select them and click the Delete button confirm by clicking “Yes”:

Here now outdated favorite bookmark are deleted from your browser. AM-Deadlinks also have the ability to detect and remove duplicates in your bookmarks.

Activities searching, downloading, uploading and other activities on the internet is very related to your internet connection. how
not, with a slow connection, I'm sure you would not like / lost comfort
while continuing your online habits, especially for bloggers who like
to download and certainly keenly felt tired because of long download
time and slow connection. For
those of you who have a problem discussed previously, the following
step-how to accelerate the download speed as well as searching on the
internet.

Speed ​​up Internet Browsing ConnectionBasically
this is just an attempt optimization tips and additional power
connections only, the rest depends on the package you take the internet,
the following tips:

1. PC Health CheckCheck your pc health is also very important to increase your connection. Why? Simple
viruses, spyware, adware, malware and its allies 80% will disrupt your
internet connection because they also use it to spread the virus to
other computers so natural that you'll slow internet! Solution is to
install an antivirus that you see fit with PC specs you, for example: Bitdefender Total Security, Norton 360 Premier, Kaspersky PURE, ESET NOD32 Smart Securtiy, and so on. Remember, do not forget to update it continues to be increasingly shunned by the viruses.

2. Install Tool and Software Optimization Internet ConnectionIn
the virtual world, many software developers who aim to optimize your
connection, ping power of the addition, optimization of the Internet,
making the Internet to another (hacking internet access / netcutting). I only discuss the optimization of internet hacking white without taking the rights of others. The solution is, use tools such as Agasta, Speed ​​Conect, and others.

3. Change DNS InternetInternet
control is a very important element especially in accelerating browsing
and downloading, internet concept: The more you use the DNS is getting
weaker "ping" is, the fewer the users, the faster internet service
offered by the provider connection especially usb modem provider. The
solution is to change the DNS that can accommodate many users, so that
the "ping" produced more stable, the following list is: